Suspicious persons database
First Claim
1. A method of processing financial transactions from a customer at an unmanned location, the method comprising:
- acquiring identification information from the customer;
determining whether the customer has previously engaged in suspicious behavior or suspicious activity by comparing the customer'"'"'s identification information to information stored in a suspicious persons database;
retrieving a score indicative of a level of suspicion if the customer has engaged in suspicious behavior or suspicious activity; and
authorizing financial transactions for the customer if the score is below a pre-selected threshold.
8 Assignments
0 Petitions
Accused Products
Abstract
Most financial transactions involving check deposits and cashing at automatic teller machines are often associated with high risk. Although conventional security measures for many automatic teller machines record financial transactions, the recorded events are typically viewed after suspicious or criminal activity has already occurred. Therefore, a financial institution may not know in advance whether requested financial transactions are of suspicious or fraudulent intent. The present teachings relate to a method of scoring customers prior to authorization in a manner so as to identify suspicious behavior or suspicious activity. The method also relates to marking suspicious individuals by storing related transaction information, such as biometric data, in a database for purposes of verifying identification information and scoring the validity of future financial transactions.
-
Citations
36 Claims
-
1. A method of processing financial transactions from a customer at an unmanned location, the method comprising:
-
acquiring identification information from the customer;
determining whether the customer has previously engaged in suspicious behavior or suspicious activity by comparing the customer'"'"'s identification information to information stored in a suspicious persons database;
retrieving a score indicative of a level of suspicion if the customer has engaged in suspicious behavior or suspicious activity; and
authorizing financial transactions for the customer if the score is below a pre-selected threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of processing financial transactions at an unmanned location, wherein customers submit checks in exchange for cash, the method comprising:
-
acquiring information relating to the financial transactions and the customers;
creating records of customers that engage in suspicious behavior or suspicious activity, wherein the records comprise scores indicative of a level of suspicion; and
approving financial transactions from customers that have scores below a preset threshold of suspicious behavior or suspicious activity. - View Dependent Claims (15)
-
-
16. A method of identifying suspicious individuals in financial transactions at an unmanned location, the method comprising:
-
tracking suspicious individuals with scores indicative of a level of suspicion;
acquiring biometric information of the suspicious individuals;
storing the scores and the biometric information as records in a database;
identifying suspicious individuals when processing financial transactions by comparing either the biometric information or the scores to the suspicious individuals during financial transactions; and
declining financial transactions for suspicious individuals if the scores are above a pre-set threshold. - View Dependent Claims (17)
-
-
18. A method of processing financial transactions that transpire in an unmanned environment, the method comprising:
-
receiving transaction information from a plurality of customers;
creating records of customers that engage in suspicious behavior or suspicious activity;
identifying suspicious behavior or suspicious activity in financial transactions by comparing the received transaction information to the records so as to identify suspicious behavior or suspicious activity;
approving the financial transactions if suspicious behavior or suspicious activity is not suspected; and
declining financial transactions if suspicious behavior or suspicious activity is suspected. - View Dependent Claims (19, 20)
-
-
21. A method of identifying suspicious behavior or suspicious activity in a financial transaction at an unmanned location, the method comprising:
-
receiving transaction requests from suspicious individuals and registered individuals at the unmanned location;
creating records of suspicious individuals having scores indicative of a level of suspicion;
comparing the scores of suspicious and registered individuals to a preset threshold of suspicion so as to identify suspicious behavior or suspicious activity;
approving the transaction requests if suspicious behavior or suspicious activity is not suspected; and
declining the transaction request if suspicious behavior or suspicious activity is suspected.
-
-
22. A system for processing financial transactions from customers at an unmanned location, the system comprising:
-
an interactive component positioned at the unmanned location, wherein the interactive component is configured to obtain transaction information relating to the financial transactions and the customers;
a storage component that records financial transactions of customers that demonstrate suspicious behavior or suspicious activity along with a score based on a level of suspicion and biometric information of the customer; and
a processing component that receives the transaction information from the interactive component and identifies suspicious behavior or suspicious activity relating to the financial transactions by either comparing the received transaction information to previously recorded scores or biometric information in the storage component. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for authorizing financial transactions at an unmanned location, wherein a customer submits a check in exchange for cash, the system comprising:
-
an input device positioned at the unmanned location, wherein the input device is configured to obtain check identification information from the check, identification information from the customer, and biometric information of the customer;
a database configured to store at least the biometric information; and
a processor configured to receive the identification information from the input device and identify suspicious behavior or suspicious activity relating to the customer prior to cashing the check by at least comparing the received biometric information to previously recorded biometric information in the database. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A method of validating a financial transaction comprising:
-
receiving identification information from a customer at an unmanned location;
generating a biometric profile of the customer; and
identifying suspicious behavior or suspicious activity by comparing the generated biometric profile to previously stored biometric profiles of previous customers, wherein identifying suspicious behavior or suspicious activity occurs prior to authorizing the financial transaction.
-
Specification